I am sitting and reflecting here at the start of Cisco Live London. As I walk the halls, I continue to be amazed by the size, depth, and breadth of this event. Networking continues to grow, and thousands of people are eager to come together to see the latest. Read More »
On February 29th, Christopher Young, Senior Vice President of Cisco Security, delivered a rousing keynote address at the RSA 2012 conference in San Francisco.
The title and theme of his presentation, “Lock it Down or Free it Up?”, spoke to the dilemma organizations of all sizes face every day. Read More »
In an effort to reduce costs and improve operational efficiency, organizations of all sizes have begun compressing their firewall and other security services into smaller form factors and fewer physical units. Many small and midsized companies have opted for UTMs to run all of their security on a single box. Unfortunately, UTMs have failed to deliver on their promise to deliver true multi-service security. Most UTMs do one or two things really well, but add all the other services as “checkbox” items just to say they have it. Read More »
I’ve always been interested in the human desire to belong to groups and how we adapt our appearance to show which ‘group’ we’re in. Even in our teenage years when many of us believe the way we dress is non-conformist in truth we’re aligning ourselves to a sub-group that exists out there.
A friend of mine in her first year at university always wore Levi 501s and walked to her English lectures with an Eighteenth century novel poking out of her right back pocket and a pack of Marlboro cigarettes in her left. The signals she hoped she gave off then make her cringe beyond belief today!
Because that’s what happens, the identity we choose to present to the outside world changes over time. Many of us become less concerned about rebelling, or we gain confidence about our identity and the way we choose to transmit it.
Organizations are faced with providing security for employees that are rapidly adopting new technology in their personal and professional lives and expect their work environments and employers to do the same. As the data from the new Cisco 2011 Annual Security Report and the Cisco Connected World Technology Report Chapter 3 show, organizations that do not or cannot provide that type of environment are at risk of losing the ability to compete for those employees and business opportunities. If employers attempt to block, deny, or forbid mobile devices, social networks, instant communications, and new technologies in the work place employees will likely ignore the policies or, even worse, find ways around them that open your environment to unrealized risks.